UPPCL AE 2019

Question 1
Consider the binary relation R=(x,y),(x,z),(z,x),(z,y)on the set x,y,z. Which of the following is TRUE?
A
R is neither symmetric nor antisymmetric
B
R is both symmetric and anti-symmetric
C
R is symmetric but not antisymmetric
D
R is not symmetric but anti-symmetric
Question 1 Explanation: 
Let A be a set in which the relation R is defined. Then R is said to be a symmetric relation, if (a, b) ∈ R ⇒ (b, a) ∈ R, that is, aRb ⇒ bRa for all (a, b) ∈ R. The relation R is antisymmetric, specifically for all a and b in A; if R(x, y) with x ≠ y, then R(y, x) must not hold. Or similarly, if R(x, y) and R(y, x), then x = y. Therefore, when (x,y) is in relation to R, then (y, x) is not. Here, x and y are nothing but the elements of set A.
Question 2
Which type of address is 255.255.255.255 according to IPv4 addressing?
A
Limited broadcast address
B
Multicast address
C
Direct broadcast address
D
Loopback address
Question 2 Explanation: 
A broadcast address is a network address used to transmit to all devices connected to a multiple-access communications network. A message sent to a broadcast address may be received by all network-attached hosts. A multicast address is used to address a specific group of devices, and a unicast address is used to address a single device. IPv4 address 255.255.255.255 is used as a limited broadcast address. Limited broadcast address 255.255.255.255 can appear as the only destination address in the IPv4 header. Limited broadcast is a type of broadcast which is limited to the Local Area Network (LAN). Routers will not forward limited broadcast IPv4 datagram packets because these broadcasts are not relevant to other networks and cause flooding everywhere in the Internet. So, the scope of limited broadcasts is limited to the Local Area Network (LAN).
Question 3
Which of the following memory types is volatile in nature?
A
Compact disk
B
Magnetic disk
C
ROM
D
RAM
Question 3 Explanation: 
Volatile memory, in contrast to non-volatile memory, is computer memory that requires power to maintain the stored information; it retains its contents while powered on but when the power is interrupted, the stored data is quickly lost. Volatile memory has several uses including as primary storage. In addition to usually being faster than forms of mass storage such as a hard disk drive, volatility can protect sensitive information, as it becomes unavailable on power-down. Most general-purpose random-access memory (RAM) is volatile
Question 4
In Two-phase locking protocol, each transaction issues lock and unlock requests in ______ phases.
A
Four
B
Five
C
Three
D
Two
Question 4 Explanation: 
In databases and transaction processing, two-phase locking (2PL) is a concurrency control method that guarantees serializability. It is also the name of the resulting set of database transaction schedules (histories). The protocol uses locks, applied by a transaction to data, which may block (interpreted as signals to stop) other transactions from accessing the same data during the transaction's life. By the 2PL protocol, locks are applied and removed in two phases: Expanding phase: locks are acquired and no locks are released. Shrinking phase: locks are released and no locks are acquired.
Question 5
Which of the following can be considered as a weak entity?
A
Edition
B
Book
C
Publisher
D
Author
Question 5 Explanation: 
In a relational database, a weak entity is an entity that cannot be uniquely identified by its attributes alone; therefore, it must use a foreign key in conjunction with its attributes to create a primary key.
Question 6
Consider the following relation schema: Product (id, name, price) What will be the output of the following SQL code? SELECT max(price) FROM Product WHERE price < (SELECT max(price) FROM Product);
A
Highest price of a product
B
Lowest price of a product
C
Second highest price of a product
D
Second lowest price of a product
Question 6 Explanation: 
Second highest price of a product
Question 7
Which of the following represents the language corresponding to the regular expression r = (aa) * (bb) * b?
A
L(r)=a2nb2m:n0,m0
B
L(r)=a2nb2m:n1,m1
C
L(r)=a2nb2m+1:n0,m0
D
L(r)=a2nb2m+1:n1,m1
Question 8
In Classful addressing for class A, how many valid maximum possible network ids can exist?
A
129
B
127
C
128
D
126
Question 9
Match the following:
A. SLR(1) 1. Medium powerful & medium cost
B. LALR(1) 2. Less powerful and less cost
C. CLR(1) 3. More powerful and more costly
A
A-1, B-3, C-2
B
A-2, B-1, C-3
C
A-1, B-2, C-3
D
A-3, B-2, C-1
Question 10
Which of the following statements is/are FALSE?
(i) By definition a relation schema is in first normal form.
(ii) A relation schema which is in third normal form is definitely in BCNF.
A
Only (ii)
B
Neither (i) nor (ii)
C
Both (i) and (ii)
D
Only (i)
Question 11
Which of the following statements are FALSE?
(i) The total length of the UDP header is 8 bytes.
(ii) DNS makes use of UDP.
(iii) The checksum field in UDP is assigned 8 bits.
(iv) UDP requires connection establishment and connection termination between sender and receiver
A
Only (i) and (iii)
B
Only (i) and (ii)
C
Only (iii) and (iv)
D
Only (ii) and (iv)
Question 12
Let R(A,B,C,D) be a relation schema and F=ABC,ABD,BCbe the set of functional dependencies defined over R. Which of the following represents the closure of the attribute set B?
A
{A, C, D}
B
{B, C}
C
{B}
D
{A, B, C}
Question 13
What is the sum of the Hexadecimal numbers (FF)16 and (BA)16?
A
(B9)16
B
(139)16
C
(1B9)16
D
(2B9)16
Question 14
Which of the following represents (-0.75)10 in IEEE 754 Single Precision (Binary32) Format?
A
1 1000 0000 1000 0000 0000 0000 0000 0000
B
1 0111 1110 1000 0000 0000 0000 0000 0000
C
1 0111 1111 1000 0000 0000 0000 0000 0000
D
1 1000 0000 1100 0000 0000 0000 0000 0000
Question 15
All register reference instructions that use an accumulator are _____ instructions.
A
Direct address mode
B
Implied-mode
C
Register-mode
D
Immediate-mode
Question 16
Which of the following is the postfix equivalent of (9-5)+2?
A
-95+2
B
95+2-
C
95-2+
D
+-952
Question 17
The following algorithm gets the number of digits in factorial of a positive integer n. Which of the following is NOT a time complexity of this algorithm?
Algorithm getNoOfDigitsInFactorialOf(n) { nd = 0
for i = 1 to n do {nd = nd + log10(i) }
nd = ceil(nd) + 1 return nd}
A
BigOmega(log n)
B
BigOh(n)
C
BigOmega(log n)
D
BigTheta(n)
Question 18
Three boxes contain 6 red, 4 black; 4 red, 6 black; and 5 red, 5 black balls respectively. One of the boxes is selected at random and a ball is drawn from it. If the ball drawn is red, then what will be the probability that it is drawn from the first box?
A
3/5
B
1/3
C
1/2
D
2/5
Question 19
Consider the height of a tree as the number of edges in the longest path between the root node and leaf nodes. If T is a min heap of height 3, then what is the smallest number of nodes that T can have?
A
8
B
4
C
15
D
7
Question 20
Which of the following is FALSE?
A
2’s complement of a 2’s complement of a number is the number itself.
B
In the 7-bit Hamming code of BCD, the parity bits are placed at 1, 2 and 4 locations.
C
Excess-3 code for 369 is 011110011100.
D
A 1-bit gray code has two code words 0 and 1 representing decimal numbers 0 and 1, respectively.
Question 21
In a file system, a(n) _______ defined a path from the current directory.
A
Virtual path name
B
Relative path name
C
Root directory
D
Absolute path name
Question 22
Which of the following is not a valid storage class in ‘C’?
A
static
B
auto
C
register
D
dynamic
Question 23
In IPv6 datagram header, which field signifies the number of hops allowed before a packet reaches the destination?
A
Time to live
B
Identification
C
Fragmentation offset
D
Hop limit
Question 24
Which of the following is a technique of gradually increasing the priority of processes that wait in the system for a long time?
A
Dispatch latency
B
Scheduling
C
Aging
D
Starvation
Question 25
A satellite link with bandwidth 20 kbps has a propagation time of 300 ms. The transmitter employs Go-back-3 ARQ scheme and each frame is assumed to be of 500 bytes. What is the possible throughput?
A
5 kbps
B
6 kbps
C
15 kbps
D
7.5 kbps
Question 26
If r is a regular expression, then which of the following is FALSE?
A
(r*)* = r+
B
∊r = r
C
r* = (r|∊)*
D
r** = r*
Question 27
Which of the following statements is FALSE?
A
A primary index is specified on the ordering key field of an ordered file of records.
B
A secondary index is an ordered file.
C
A primary index is an unordered file.
D
A clustering index is an ordered file.
Question 28
Which of the following is the longest common subsequence of the sequences < h, i, n, d, u, i, s, t, a, n > and < i, n, d, i, a, n > ?
A
< i, n, d, i, a, n >
B
< i, n, d, i, a >
C
< i, n, d, i >
D
< i, n, d >
Question 29
Which one of the following problems is undecidable?
A
Memberships problem for CFGs
B
Equivalence problem for FSAs
C
Finiteness problem for FSAs
D
Ambiguity problem for CFGs
Question 30
Which of the following statements is FALSE?
A
If G1 is unrestricted grammar and G2 is regular grammar then the problem L(G1)L(G2)=is undecidable.
B
If M1and M2are two Turing machines, then the problem L(M1)L(M2) is decidable
C
If a language is non-recursive, then there is no membership algorithm for it.
D
If G1is unrestricted grammar, then the problem L(G1)=L(G2)* is undecidable
Question 31
A 0-1 knapsack problem has four items and knapsack capacity 11. The weight and profit of each item is given in the table below.

Which of the following greedy strategies gives the maximum profit?
A
Lightest item first
B
Largest profit first
C
Heaviest item first
D
Largest profit per unit weight first
Question 32
With respect to RDBMS, a ______ is the unit of data transfer between disk and memory.
A
Block
B
Bit
C
Byte
D
Record
Question 33
schedule in which each transaction is executed atomically is called a ______.
A
Serial schedule
B
Non-parallel schedule
C
Non-serial schedule
D
Parallel schedule
Question 34
Which of the following forms the complete set of Relational Algebra operations?
A
Projection, Union, Set difference, and Cross product
B
Selection, Union, Set difference, and Cross product
C
Selection, Projection, Intersection, Set difference, and Cross product
D
Selection, Projection, Union, Set difference, and Cross product
Question 35
Which of the following code is employed by K-map for simplification of Boolean expression?
A
NBCD
B
Gray code
C
Excess-3 code
D
BCD
Question 36
Which of the following statements is FALSE?
A
The language L={an: n>=4} is NOT regular.
B
A language L is regular if and only if there exists a corresponding DFA to accept it.
C
If L is regular, then L-{λ} is also regular.
D
If L is a regular language, then L2 is also a regular language.
Question 37
What is the port number for SMTP protocol?
A
80
B
22
C
110
D
25
Question 38
Which of the following is not a subsequence of the sequence < h, i, n, d, i, s, t, a, n > ?
A
< i, n, d, i, a >
B
< h, i, n, d >
C
< s, t, a, n >
D
< d, i, s, h >
Question 39
______ is a memory-management scheme that supports the user view of RAM.
A
Hit-ratio
B
Fragmentation
C
Segmentation
D
Paging
Question 40
_____ is a program in execution.
A
Program counter
B
Process
C
Stack
D
Heap
Question 41
______ is a memory-management scheme that permits the physical address space of a process to be ______.
A
Thrashing, non-contiguous
B
Thrashing, contiguous
C
Paging, contiguous
D
Paging, non-contiguous
Question 42
A grammar that produces more than one parse tree of a sentence is known as:
A
Non ambiguous
B
Context sensitive
C
Ambiguous
D
Regular
Question 43
Consider the “Supply” relationship relating the entities “Supplier” and “Product”. Under default assumption, what will be the cardinality of the “Supply” relationship?
A
1:N
B
1:1
C
M:N
D
N:1
Question 44
In RDBMS, domain constraint is also called:
A
Tuple constraint
B
Table constraint
C
Database constraint
D
Attribute constraint
Question 45
Consider the following set of processes, and the length of the CPU burst given in ms. What is the average waiting time using priority scheduling?
A
10 ms
B
7.2 ms
C
8.2 ms
D
5.2 ms
Question 46
Which of the following is regular grammar?
A
SabA, AbaB, BaA, Bbb
B
SaSa, SbSb, S
C
SabB, AaaBb, BbbAa, A
D
SaSb, SSS, S
Question 47
Encrypt plain text: THIS IS PLAIN TEXT; given key: SACRED. Use a transposition cipher. Assume padding, if required.
A
STW INV SIU IAT HLX TPE
B
TPE STW SIU HLX INV IAT
C
HLX IAT STW INV SIU TPE
D
IAT HLX STW INV SIU TPE
Question 48
What is the range of the exponent E in IEEE 754 Double Precision (Binary64) format?
A
-1022 <= E <= 1022
B
-1023 <= E <= 1023
C
-1022 <= E <= 1023
D
-1023 <= E <= 1022
Question 49
The number of processes that are completed by a system per time unit, is called ______.
A
Response time
B
Turnaround time
C
Throughput
D
Process output
Question 50
Which of the following is a data structure that is used to hold information about source code during the compilation process?
A
Context free grammar
B
Intermediate code
C
Lexical analyzer
D
Process output
Question 51
Which of the following is the smallest 4-bit negative number stored in its 2’s complement representation?
A
1111
B
1000
C
0000
D
0111
Question 52
Which of the following Relational Algebra operations can be used when you want to keep all the tuples of the first relation irrespective of whether or not they have matching tuples in the second relation?
A
Theta join
B
Left-outer join
C
Natural join
D
Right-outer join
Question 53
Which of the following statements in ‘C’ forces the next iteration of the loop to take place, skipping any code in between?
A
continue
B
switch
C
break
D
case
Question 54
Let R is a relation schema and X,YR. “If YX, then XY” represents which of the following inference rules?
A
Pseudotransitive
B
Augmentation
C
Decomposition
D
Reflexive
Question 55
Which of the following statements is FALSE?
A
An Oracle database cannot have more than 16 tables
B
Oracle is a relational database management system
C
Oracle supports SQL
D
In Oracle 12c, the letter ‘c’ stands for cloud
Question 56
The family of context-free languages is NOT closed under:
A
Union
B
Concatenation
C
Star-closure
D
Intersection
Question 57
_____ measure is the time from the submission of a request until the first output is produced.
A
Turnaround time
B
Waiting time
C
Response time
D
Throughput
Question 58
The Prim’s algorithm for finding the minimum spanning tree is based on ______ approach.
A
Greedy
B
Divide and Conquer
C
Dynamic Programming
D
Backtracking
Question 59
The area of the region enclosed by the parabola y=2-x2 and the line y=-x is equal to:
A
2
B
6
C
3/2
D
9/2
Question 60
The degree of a database relation is also called as:
A
Arity
B
Extension
C
Size
D
Cardinality
Question 61
Reduced Instruction Set Computer (RISC) is based on which of the following architectures?
A
Stack Architecture
B
CISC Architecture
C
Von Neumann Architecture
D
Harvard Architecture
Question 62
An address generated by the CPU is known as _____ address, and an address seen by the memory unit is referred to as _____ address.
A
Physical, Logical
B
Logical, Virtual
C
Logical, Physical
D
Virtual, Logical
Question 63
Which of the following is not a valid integer literal in ‘C’?
A
077U
B
032UU
C
32LU
D
0xFeeL
Question 64
_____ is generated when it is known at compile time where the process resides in memory.
A
Absolute code
B
Virtual code
C
Locatable code
D
Relocatable code
Question 65
Which of the following code is unweighted and self-complementing?
A
Excess-3 code
B
8, 4, -2, -1 code
C
NBCD
D
Gray code
Question 66
Consider the height of a tree as the number of edges in the longest path between the root node and leaf nodes. If T is a binary tree of height 3, then what is the smallest and largest number of nodes that T can have?
A
Smallest: 4, Largest: 7
B
Smallest: 3, Largest: 7
C
Smallest: 3, Largest: 15
D
Smallest: 4, Largest: 15
Question 67
_____ is a situation in which processes wait indefinitely within the semaphore.
A
Starvation
B
Critical section
C
Locking
D
Definite waiting
Question 68
Which of the following statement(s) is/are TRUE?
(i) For every NFA with an arbitrary number of final states, there is an equivalent NFA with only one final state.
(ii) A language that is accepted by a DFA will also be accepted by some NFA.
A
Neither (i) nor (ii)
B
Both (i) and (ii)
C
Only (ii)
D
Only (i)
Question 69
In ER-diagram, total participation of an entity into a relationship is shown using:
A
Dashed line
B
Double line
C
Rectangle
D
Single line
Question 70
Which of the following is the first phase of the compiler which is also termed as scanning?
A
Semantic analysis
B
Code optimization
C
Syntax analysis
D
Lexical analysis
Question 71
Which one of the following statements is FALSE?
A
In static checking, a compiler front end checks that the source program follows the syntactic and semantic rules of the source language.
B
Syntax-tree nodes are created to represent programming constructs.
C
In concrete syntax, the assignment operator is left associative.
D
A coercion occurs if the type of an operand is automatically converted to the type expected by the operator.
Question 72
Which of the following statement(s) is /are FALSE?
(i) The grammar S→Aa | bAc | dc | bda, A→d is LALR(1) but not SLR(1).
(ii) The grammar S→Aa | bAc | Bc | bBa, A→d, Bd is LALR(1) but not LR(1).
A
Both (i) and (ii)
B
Only (i)
C
Only (ii)
D
Neither (i) nor (ii)
Question 73
How many page faults will occur if FIFO Page replacement algorithm is used for the following reference string with three page frames? 7,0,1,2,0,3,0,4,2,3,0,3,2,1,2,0,1,7,0,1
A
14
B
16
C
17
D
15
Question 74
Let a user process be 100 MB in size, and the backing store is a standard hard disk with a transfer rate of 50 MB per second. The actual transfer of the 100 MB process to or from main memory will take:
A
3 seconds
B
4 seconds
C
2 seconds
D
1 second
Question 75
Which of the following statements is/are TRUE?
(i) Weak entities always have total participation in the identifying relationship
(ii) Every relation schema must have at least one weak entity.
A
Both (i) and (ii)
B
Only (i)
C
Only (ii)
D
Neither (i) nor (ii)
Question 76
In the following diagram, if link V1-V4 is removed, then how does the routing table for distance vector routing protocol vary for the node V1?
A
(0,3,10,,19)
B
(0,3,8,13,19)
C
(0,3,9,,11)
D
(0,3,8,5,11)
Question 77
A _____ is a complete binary tree in which the value of each node is less than or equal to the value of its parent, with the maximum-value element at the root.
A
Min heap
B
B tree
C
Max heap
D
Binary search tree
Question 78
Which of the following is the standard implementation of Ethernet on twisted pair wiring?
A
1000BASE-X
B
1000BASE-T
C
1000BASE-F
D
1000BASE-SX
Question 79
How many boolean functions of k variables are possible such that there are exactly m minterms?
A
C(2k,m)
B
P(2k,m)
C
2k
D
2k-1
Question 80
A state is known as _____, if the system allocates resources to each process and still avoids a deadlock.
A
Locked
B
Safe
C
Unsafe
D
Protected
Question 81
The _____ operation selects certain columns from a table and discards the other columns.
A
Join
B
Select
C
Union
D
Project
Question 82
Which of the following employee attributes can be considered as multi-valued as well as composite?
A
Designation
B
Date of birth
C
Telephone
D
Social security number
Question 83
Consider a grammar G with the following production rules: S→SS,S,S→aSb, S→bSa Which one of the following languages is generated using the above rules?
A
L=w: number of a is>number of b
B
L=anbn >= n1
C
L=w: number of a and b are equal
D
L=an bn >= n0
Question 84
Which of the following statement(s) is/are FALSE? (i) There exists a recursively enumerable language whose complement is not recursively enumerable. (ii) If a language L is recursive, then its complement is NOT recursive.
A
Neither (i) nor (ii)
B
Only (ii)
C
Both (i) and (ii)
D
Only (i)
Question 85
If there is a single router R1 between a source S and a destination D, then how many times will a packet visit the application layer, network layer and data link layer (including S, R1 and D), respectively?
A
2, 3, 3
B
2, 3, 4
C
3, 3, 3
D
3, 3, 4
Question 86
Which of the following statements is FALSE?
A
If L1is a regular language then L1* is also regular.
B
A regular grammar is either right-linear or left-linear.
C
Family of regular languages are NOT closed under intersection.
D
A language L is regular if and only if there exists a left-linear grammar G.
Question 87
The solution to critical section problem must ensure following conditions:
A
Mutual Exclusion, Progress, and Bounded Waiting
B
Only Mutual Exclusion and Bounded Waiting
C
Only Progress and Bounded Waiting
D
Only Mutual Exclusion and Progress
Question 88
Let in a file the frequency of letters i, n, d, e, x are 16, 7, 17, 25, 20 respectively. Which of the following is Huffman's code of the letter ‘x’?
A
101
B
01
C
11
D
001
Question 89
Given the following plain text and cipher text , decipher the text: HELLOITSME. Plain text: THISISACOMPUTER Cipher Text: WKLVLVDFRPSXWHU
A
DAHHKEPOIA
B
KHOORLWVPH
C
LIPPSMXWQI
D
EBIILFQPJB
Question 90
How many page faults will occur if the Optimal Page replacement algorithm is used for the following reference string with three page frames? 7,0,1,2,0,3,0, 4,2,3,0,3,2,1,2,0,1,7,0,1
A
8
B
9
C
10
D
7
Question 91
A manufacturer knows that the condensers he makes contain on an average 1% od defectives. He packs them in boxes of 100. What is the probability that a box picked at random will contain 4 or more faulty condensers?
A
0.019
B
0.981
C
0.568
D
0.010
Question 92
In _____ of the two-phase locking protocol, a transaction may obtain locks but may not release any locks.
A
Write only phase
B
Growing phase
C
Shrinking phase
D
Read only phase
Question 93
Relational Algebra is a _____ language.
A
Natural
B
Procedural
C
Non-procedural
D
Low-level
Question 94
Which of the following registers holds the address of an instruction?
A
AC
B
IR
C
DR
D
PC
Question 95
Details about each process is stored in a data structure called:
A
Heap
B
Process Control Block
C
Process Count Block
D
Stack
Question 96
Let Xij=I{zi is compared to zj in quick sort algorithm} is an indicator variable, and zi is the ith smallest number.
Which of the following sequence of the numbers give the X2.5=1?
Note: Assume that there is divide and conquer quick sort algorithm and in partition algorithm the first element of the lists is taken as pivot-element.
A
40, 50, 10, 20, 30
B
30, 20, 10, 40, 50
C
40, 20, 10, 30, 50
D
10, 20, 50, 30, 40
Question 97
Which of the following is not a valid process state?
A
Hold
B
Ready
C
Running
D
Blocked
Question 98
In which of the following network topologies, each device has a dedicated point-to-point link with only two devices on its either side and a signal is passed in one direction, from source to destination?
A
Mesh
B
Ring
C
Bus
D
Star
Question 99
If , then the value of k is equal to:
A
3
B
4
C
2
D
1
Question 100
100. In an RSA cryptosystem, a participant uses two prime numbers p=3 and q=11 to generate his public and private keys. If the private key is 7, then how will the text COMPUTER be encrypted using the public key?
A
27 9 19 4 21 8 26 24
B
9 27 4 25 12 4 25 27
C
27 9 19 4 12 4 25 27
D
9 27 4 25 21 8 26 24
Question 101
Which of the following statement(s) is/are TRUE?
(i) The family of context-free languages is the proper subset of the family of regular languages.
(ii) The family of recursive languages is a proper subset of the family of recursively enumerable languages.
A
Only (i)
B
Both (i) and (ii)
C
Neither (i) nor (ii)
D
Only (ii)
Question 102
______ semaphores are also known as ______ locks, as they are locks that provide mutual exclusion.
A
Binary, Mutex
B
Counting, Shared
C
Binary, Shared
D
Counting, Mutex
Question 103
Which of the following statements is/are TRUE?
(i) Efficiency of CSMA/CD is 1/(1+6.44a), where a=Tp/Tt
(ii) Polling works like Time Division Multiplexing.
(iii) Maximum efficiency of pure aloha is 36.8%.
A
Only (i) and (iii)
B
Only (ii) and (iii)
C
Only (i) and (ii)
D
Only (i)
Question 104
What is the dual of the Boolean function x+yz?
A
xyz
B
x+yz
C
(x+y)(x+z)
D
x(y+z)
Question 105
Which of the following layers of the OSI model ensures node-to-node delivery and framing of data?
A
Transport Layer
B
Data Link Layer
C
Network Layer
D
Physical Layer
Question 106
Which of the following is the default storage class for local variables in ‘C’?
A
extern
B
auto
C
static
D
register
Question 107
Which of the following states is forbidden in SR flip-flop?
A
S=0, R=0
B
S=1, R=0
C
S=1, R=1
D
S=0, R=1
Question 108
Consider the relation schema: Singer(singerName, songName). What is the highest normal form satisfied by the “Singer” relation schema?
A
INF
B
BCNF
C
2NF
D
3NF
Question 109
Which of the following is not a flow control technique?
A
Selective Repeat ARQ
B
Stop-and-wait ARQ
C
CRC
D
Go-Back-N ARQ
Question 110
Which one of the following statements is FALSE?
A
A safe state is not a deadlocked state
B
Deadlocked state is an unsafe state
C
All unsafe state may lead to a deadlock
D
All unsafe states lead to deadlocks
Question 111
Which of the following interrupts arises from an illegal or erroneous use of an instruction or data?
A
Software
B
Internal
C
External
D
Asynchronous
Question 112
Consider the following grammar: E→TE' E→+TE' | ∊ T→FT' ; T'*FT' | ∊ F→(E) | (id) What will be the result of FIRST(T') ?
A
{*, ∊}
B
{*, id}
C
{+, id}
D
{+, ∊}
Question 113
How many solutions does the equation x+y+z=11 have, where x,y and z are non-negative integers?
A
86
B
78
C
66
D
68
Question 114
If a regular expression includes unary operator (*), concatenation, and |, then which of the following statements is TRUE?
A
Both (*) and concatenation have equal precedence and are right associative
B
(*) has highest precedence and is right associative
C
has lowest precedence and is left associative
D
Concatenation and | have equal precedence and are left associative
Question 115
Under ______ scheduling, once the CPU has been allocated to a process, the process keeps the CPU until it releases the CPU either by terminating or by switching to the waiting state.
A
Preventative
B
Non-preemptive
C
Preemptive
D
Preventive
Question 116
What is the value of the following ‘C’ language expression? (2?3:4)+8/4/2
A
8
B
4
C
7
D
2
Question 117
Which of the following represents +0 and -0 distinctly?
A
1’s complement representation only
B
2’s complement representation only
C
Both sign-magnitude and 2’s complement representations
D
Both sign-magnitude and 1’s complement representations
Question 118
The weights assigned to LSB and MSB in an 8-bit binary number are _____ and _____, respectively.
A
1, 8
B
0, 7
C
1, 128
D
0, 127
Question 119
What is the minimum number of bits required for the opcode to perform a total of 36 distinct operations?
A
36
B
4
C
5
D
6
Question 120
Which of the following switching services are appropriate for setting up
(i) a voice communication and
(ii) internet services, respectively?
A
(i) Circuit switching, (ii) Message switching
B
(i) Packet switching, (ii) Message switching
C
(i) Circuit switching, (ii) Packet switching
D
(i) Packet switching, (ii) Circuit switching
Question 121
If the expected value of a random variable X is 2 and its variance is 1, then what will be the variance of 3X+4?
A
7
B
6
C
11
D
9
Question 122
Consider the relation schemas R(A, B, C, D) and s(D, E, F). What will be the degree of the resultant schema R*S, where star (*) symbol represents the natural join operation?
A
6
B
4
C
3
D
7
Question 123
The value of the primary key can’t be null. Which of the following defines this constraint?
A
Domain constraint
B
Entity integrity constraint
C
Key constraint
D
Referential integrity constraint
Question 124
Which of the following statement(s) is/are FALSE?
(i) Language L1=anbmcndm,n>=0,m>=0 is not context free grammar.
(ii) Language L2=anbncn,n>=0 is a context free grammar.
A
Neither (i) nor (ii)
B
Only (i)
C
Only (ii)
D
Both (i) and (ii)
Question 125
Which of the following statements is/are FALSE?
(i) The size of an integer pointer is always less than the size of a float pointer.
(ii) A pointer variable cannot be assigned NULL.
(iii) A single pipe (|) symbol is used to represent the logical OR operator in ‘C’.
A
Only (ii) and (iii)
B
Only (ii)
C
All (i), (ii) and (iii)
D
Only (i)
Question 126
A process is a program that performs _____ of execution.
A
Single thread
B
Multiple threads
C
Parallel threads
D
Al least four threads
Question 127
Which of the following is the worst-case time complexity of the merge-sort algorithm?
A
(n lg n)
B
n2
C
n1.5 lg n
D
O(n)
Question 128
What is the minimized expression of: (A,B,C,D)=(A+B+C'+D')(A'+C+D')(A'+B+C'+D')(B'+C)(B'+C')(A+B')(B'+D')
A
B'(A'+D')(C'+D')
B
B(A'+D')(C'+D')
C
B'(A'+D)(C'+D')
D
B(A'+D)(C'+D')
Question 129
If transaction T1 reads a change made by transaction T2, then T1 commits only after T2 commits. This property of a transaction schedule is known as:
A
Serializable
B
Strict
C
Recoverable
D
Cascadeless
Question 130
Consider an 8-bit ALU with a 4-bit status register. The four status bits are C, S, Z, and V which stand for carry, sign, zero, and overflow, respectively. Let A = 1111 0000 and B = 0001 0100 and ALU performs A - B. Which of the following represents the state of the 4-bit status register?
A
0000
B
1111
C
1100
D
0011
Question 131
Which of the following statements is/are FALSE?
(i) A firewall acts as a packet filter inspecting all the packets entering the local network.
(ii) Digital signatures do not provide nonrepudiation.
(iii) Asymmetric cryptography uses both public and private keys.
A
Only (iii)
B
Only (i) and (iii)
C
Only (ii) and (iii)
D
Only (ii)
Question 132
LL(1) parser is also known as:
A
Recursive predictive parser
B
Recursive descent parser
C
Non-recursive predictive parser
D
Non-recursive descent parser
Question 133
Let A is an integer variable containing 60. What will be the output of the following ‘C’ expression? A >> 2
A
240
B
30
C
15
D
120
Question 134
Which of the given options best describes the truthfulness of the following statements?
(i) Any square matrix A and its transpose AT have the same Eigenvalues.
(ii) Eigenvectors of a symmetric matrix corresponding to different Eigenvalues are orthogonal.
A
(i) - False, (ii) - False
B
(i) - True, (ii) - True
C
(i) - False, (ii) - True
D
(i) - True, (ii) - False
Question 135
Consider the following array declaration:
int arr[4] = {2, 4, 5};
What will be the output of the following ‘C’ statement?
printf(“%d”, 3[arr]);
A
Garbage
B
5
C
0
D
2
Question 136
Which of the following defines TRAP?
A
Non-maskable Interrupt
B
Maskable Interrupt
C
Software Interrupt
D
External Interrupt
Question 137
Which one of the following statements is FALSE?
A
Turing recognizable languages are closed under union and intersection.
B
{ap | p is prime number} is accepted by Turing Machine
C
Turing recognizable languages are closed under union and complementation
D
Turing decidable languages are closed under intersection and complementation
Question 138
Internal interrupts are _____ and external interrupts are _____ with regard to program.
A
Asynchronous, asynchronous
B
Synchronous, synchronous
C
Asynchronous, synchronous
D
Synchronous, asynchronous
Question 139
Let R and S be two database relations. If cardinalities of R and S are 4 and 10, respectively, then what will be the number of tuples in RS where ‘×’ represents cross product operation?
A
14
B
10
C
4
D
40
Question 140
What is the minimum number of states required by a Turing Machine to accept strings which consist of an even number of 1’s?
A
4
B
2
C
1
D
5
Question 141
Consider a memory chip with 24 address pins and 16 data pins. How many locations will it accommodate?
A
224
B
224x4
C
216
D
224x16
Question 142
Given is an input of burst data at a rate 22 Mbps for 5s. After a halt of 12s, again data flows at the rate of 15 Mbps for 4s. For effective working of a Leaky Bucket algorithm, what should be the rate of flow of output data provided that the bucket functions for 8s?
A
64.7 Mbps
B
161.7 Mbps
C
151.1 Mbps
D
69.3 Mbps
Question 143
In _____, records are placed in the order in which they are inserted, so new records are inserted at the end of the file.
A
Heap file
B
Ordered file
C
Hash file
D
Sorted file
Question 144
A user logs into a remote computer using
(i) and then transfers his file to his own computer using
(ii) and finally emails it using (iii).
What could (i), (ii), (iii), respectively, be?
A
(i) - HTTP, (ii) - TFTP, (iii) - SMTP
B
(i) - TELNET, (ii) - TFTP, (iii) - HTTP
C
(i) - SMTP, (ii) - FTP, (iii) - HTTP
D
(i) - TELNET, (ii) - FTP, (iii) - SMTP
Question 145
What is the Canonical POS form of the following Boolean function? (A+B)(A+C)(B'+C')(C+A)
A
(A+B+C)(A+B+C')(A+B'+C)(A+B'+C')(A'+B'+C')
B
(A+B+C)(A+B+C')(A+B'+C)(A+B'+C')
C
(A+B)(A+C)(B'+C')
D
(A+B+C)(A'+B+C)(A+B'+C)(A+B+C')(A'+B'+C')
Question 146
Assume a 4-segment pipeline system with a clock cycle of 20 ns required in each segment to execute 100 tasks in sequence. What is the speedup ratio?
A
4.6
B
4.12
C
3.6
D
3.88
Question 147
Which of the following conditions need to be held simultaneously for deadlock occurrences?
A
Mutual Exclusion, Hold and Wait, and No Preemption
B
Mutual Exclusion, No Preemption, and Circular Wait
C
Mutual Exclusion, Hold and Wait, No Preemption, and Circular Wait
D
Hold and Wait, No Preemption, and Circular Wait
Question 148
Which of the following statements is FALSE?
A
A database relation can have both primary key and secondary key
B
A database relation can have more than one primary key
C
A database relation can have more than one candidate key
D
A database relation can have more than one foreign key
Question 149
Which of the following is not a transaction control command in SQL?
A
Commit
B
Rollback
C
Grant
D
Savepoint
Question 150
Which of the following represents the three basic SQL DML commands?
A
Insert, Alter, Delete
B
Insert, Update, Create
C
Insert, Update, Delete
D
Drop, Update, Delete
Question 151
In a computer when the access time taken is less the speed of the memory is _____.
A
Constant
B
Slower
C
Faster
D
Inconsistent
Question 152
The Article 51A containing Fundamental Duties was inserted in the Constitution by the 42nd amendment in the year _____.
A
1952
B
1971
C
1976
D
1964
Question 153
Which stadium in India is the second largest football stadium in the world?
A
Salt Lake Stadium
B
Eden Garden Stadium
C
Jawaharlal Nehru Stadium
D
Wankhede Stadium
Question 154
‘Regur Soil’ is the other name for which one of the following types of soil?
A
Laterite soil
B
Alluvial soil
C
Arid soil
D
Black soil
Question 155
When was Saansad Adarsh Gram Yojana (SAGY) in which Members of India’s Parliament needed to identify and develop one village from their constituencies launched?
A
2007
B
2013
C
2010
D
2014
Question 156
The athletes of which Indian state won 22 out of the 66 medals won by India at the 2018 Commonwealth Games (CWG 2018) in Gold Coast?
A
Punjab
B
Maharashtra
C
Madhya Pradesh
D
Haryana
Question 157
When was the Inland Emigration Act passed under which plantation workers were not permitted to leave the tea gardens without permission?
A
1887
B
1884
C
1859
D
1896
Question 158
The ‘86th amendment of the Constitution’ in December 2002 led to inserting of which fundamental right?
A
Property
B
Education
C
Equality
D
Freedom
Question 159
Sachin Tendulkar made his Test Cricket debut against the team of which one of the following nations?
A
Pakistan
B
New Zealand
C
Sri Lanka
D
South Africa
Question 160
A devastating fire occurred in 2019 in the Amazon rainforests of which one of the following nations?
A
USA
B
Argentina
C
Brazil
D
Canada
Question 161
Which schedule of the constitution was intended to protect land reform laws from being challenged in courts on the grounds of violation of fundamental rights?
A
Schedule 3
B
Schedule 7
C
Schedule 9
D
Schedule 5
Question 162
In which Olympic games did the first Indian woman Karnam Malleswari win a bronze medal?
A
Atlanta
B
Moscow
C
Sydney
D
Seoul
Question 163
Arable land in the irrigated zones of India is becoming saline because of _____.
A
Over-Irrigation
B
Heavy rainfall
C
Overuse of pesticides
D
Overgrazing
Question 164
In ______Mahatma Gandhi organized a satyagraha to support the peasants of the Kheda district of Gujarat.
A
1917
B
1916
C
1918
D
1915
Question 165
Which organization among the following was set up in 1982 to coordinate the activities of all institutions involved in the rural financing system?
A
APEDA
B
FCI
C
NABARD
D
SIDBI
Question 166
The ‘Fit India movement’ was launched by the Government of India in the month of ______.
A
July
B
August
C
May
D
June
Question 167
A computer software that is sold and bundled with hardware is termed as _____.
A
Demo Software
B
OEM Software
C
Retail Software
D
Public Domain Software
Question 168
How many years of rule has the Chinese Communist Party (CCP) completed in 2019?
A
70 years
B
55 years
C
25 years
D
65 years
Question 169
What is the name of the joint military exercise between India and Thailand conducted between 16th to 29th September 2019?
A
PRATHAM
B
GARGEE
C
PARIJAT
D
MAITREE
Question 170
What is the basic program used as an interface between the operating system and the motherboard?
A
Advanced Technology Extended (ATX)
B
Dual In-Line Memory Module (DIMM)
C
Universal Serial Bus (USB)
D
Basic Input Output System (BIOS)
Question 171
Which of the following options can replace the question mark (?) correctly? Y9Q, W20U, U42X, S86Z, ?
A
P174B
B
Q172A
C
Q174A
D
P174A
Question 172
A
B
C
D
Question 173
Which of the following terms is related to the term ‘PRQS’ in the same way as the term ‘CEDK’ is related to the term ‘DFEG’?
A
OPQV
B
QOPV
C
PQOW
D
OQPW
Question 174
Peter went in his car to meet his father. Starting from his office, he drove 35 km towards East, 15 km towards North, 35 km towards West and then 25 km South, where he met his father. How far and in which direction is Peter’s office from the place he met his father?
A
10 km, North
B
20 km, West
C
15 km, South
D
18 km, East
Question 175
Which of the following options can replace the question mark (?) correctly?
A
45
B
82
C
66
D
75
Question 176
A
A
B
B
C
C
D
D
Question 177
A
A
B
B
C
C
D
D
Question 178
Which of the following cubes will be formed when the given paper is folded to form a cube?
A
A
B
B
C
C
D
D
Question 179
In a certain coding language, ‘mango is the king of fruit’ is written as ‘@ $ % & H E’; ‘the king lives in the palace’ is written as ‘@ H U @ # !’; and ‘Palace wise king’ is written as ‘G H #’. What is the code of ‘the wise’ in that language?
A
! H
B
H G
C
G @
D
# @
Question 180
A
A
B
B
C
C
D
D
Question 181
Consider the two statements to be true even if they are at variation with the commonly known facts and decide which of the given conclusions logically follow from the statements. Statements: I . Some boys are pens. II. All pens are fruits. Conclusions: A. No boy is a fruit. B. All pens are boys.
A
Both A and B follow
B
Only conclusion A follows
C
Only conclusion B follows
D
Neither A nor B follows
Question 182
A
A
B
B
C
C
D
D
Question 183
A
A
B
B
C
C
D
D
Question 184
A
B
C
D
Question 185
In an aircraft, there are 25 passengers and the following table shows the number of passengers and their corresponding weights.

What is the approximate average weight of all the 25 passengers?
A
71 kg
B
67 kg
C
72 kg
D
75 kg
Question 186
Which of the following options can replace the question mark (?) correctly? 6, 13, 27, 55, 111, 223, ?
A
1579
B
1606
C
447
D
1098
Question 186 Explanation: 
It is incremented by its own number + 1 → 6 + 6 + 1 = 13 → 13 + 13 +1 = 27 → 27 + 27 + 1 = 55 → 55 + 55 + 1 = 111 → 111 + 111 + 1 = 223 → 223 + 223 + 1 = 447
Question 187
A
A
B
B
C
C
D
D
Question 188
A
5
B
7
C
3
D
6
Question 189
Which of the given conclusions logically follows from the given statements? Statements: I. No fruits are boys. II.No boys are tables. Conclusion A: Some fruits are boys. Conclusion B: Some boys are fruits.
A
Only conclusion B follows
B
Neither A nor B follows
C
Only conclusion A follows
D
Both A and B follow
Question 190
Find out the pair in which the words bear the same relationship to each other as the words of the given pair. Nun : Convent
A
Soldier : Barracks
B
Expand : Condense
C
Shirt : Garment
D
Fox : Vixen
Question 191
A
A
B
B
C
C
D
D
Question 192
A
A
B
B
C
C
D
D
Question 193
A
A
B
B
C
C
D
D
Question 194
A
A
B
B
C
C
D
D
Question 195
A
A
B
B
C
C
D
D
Question 196
A
A
B
B
C
C
D
D
Question 197
A
A
B
B
C
C
D
D
Question 198
A
A
B
B
C
C
D
D
Question 199
A
A
B
B
C
C
D
D
Question 200
A
A
B
B
C
C
D
D
There are 200 questions to complete.